0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings... Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings (Paperback, 2014 ed.)
Atul Prakash, Rudrapatna Shyamasundar
R2,693 Discovery Miles 26 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.

Information Systems Security - 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings... Information Systems Security - 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings (Paperback, 2009 ed.)
Atul Prakash
R1,420 Discovery Miles 14 200 Ships in 18 - 22 working days

The management of services and operations in today's organizations are - coming increasingly dependent on their enterprise local area network (enterprise LAN). An enterprise LAN consists of a set of network zones (logical group of networkelements)correspondingto di?erent departments orsections,connected through various interface switches (typically, Layer-3 switches). The network service accesses between these zones and also with the external network (e. g. , Internet) are governed by a global network security policy of the organization. This global policy is de?ned as a collection of service access rules across various network zones where the services referred network applications conforming to TCP/IP protocol. For example, some of the known network services aressh, t- net,http etc. In reality, the security policy may be incompletely speci?ed; which explicitly states the "permit" and "deny" access rules between speci?c network zones keeping remaining service access paths as unspeci?ed. The global security policy is realized in the network by con?guring the n- work interfaces with appropriate sets of access control rules (ACLs). One of the major challenges in network security management is ensuring the conformation of the distributed security implementations with the global security policy.

Me Ki Gai - A Young Man's Journey discovering his Ikigai, Love, Happiness and Riches (Paperback): Seun Adesida Me Ki Gai - A Young Man's Journey discovering his Ikigai, Love, Happiness and Riches (Paperback)
Seun Adesida; Atul Prakash Khekade
R302 Discovery Miles 3 020 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Casio LW-200-7AV Watch with 10-Year…
R999 R899 Discovery Miles 8 990
Dala Coloured Pencils (12 Pack)
R67 Discovery Miles 670
Karcher WD2 Plus Vacuum Cleaner (1000W)
R2,199 R1,999 Discovery Miles 19 990
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Peptine Pro Canine/Feline Hydrolysed…
R369 R259 Discovery Miles 2 590
Linx Ross Mid Back Typist Chair (Black)
 (3)
R1,249 R1,135 Discovery Miles 11 350
Maped Zenoa Fit Scissors (18cm…
R119 R79 Discovery Miles 790
Portable Camping Hiking Cook Set (10pc)
R1,379 R659 Discovery Miles 6 590
Christmas Nativity With House & Cross…
R1,299 R1,074 Discovery Miles 10 740
Ab Wheel
R209 R149 Discovery Miles 1 490

 

Partners